Your browser does not allow storing cookies. We recommend enabling them.

MAJOR UK FINANCIAL INSTITUTION INCREASES INVESTMENT IN SSH INFRASTRUCTURE

Helsinki, Finland, 2014-12-04 08:45 CET (GLOBE NEWSWIRE) -- SSH COMMUNICATIONS SECURITY CORPORATION COMPANY ANNOUNCEMENT DECEMBER 4, 2014 AT 9:45AM

MAJOR UK FINANCIAL INSTITUTION INCREASES INVESTMENT IN SSH INFRASTRUCTURE

A major UK financial institution has increased its investment in SSH technology with a total order value of software licensing and maintenance at EUR 0.6 million. Software license sales of the received order will be recognized during fourth quarter 2014 and the maintenance sales portion during fiscal years 2015 – 2019. The contract values include the reseller´s share.


Helsinki, December 4, 2014

SSH COMMUNICATIONS SECURITY CORPORATION

Harri Koponen Chief Executive Officer

Distribution: NASDAQ OMX Helsinki Oy Major media www.ssh.com

Further information: Harri Koponen, CEO, +358 20 500 7000 Jyrki Lalla, CFO, +358 45 340 4641

About SSH Communications Security Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security. Today, over 3,000 customers across the globe - including seven of the Fortune 10 - trust our Information Assurance Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. A fast-growing company, SSH Communications Security operates in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more